/openssl/crypto/chacha/ |
H A D | chacha_enc.c | 97 u32 input[16]; in ChaCha20_ctr32() local 115 input[4] = key[0]; in ChaCha20_ctr32() 116 input[5] = key[1]; in ChaCha20_ctr32() 117 input[6] = key[2]; in ChaCha20_ctr32() 118 input[7] = key[3]; in ChaCha20_ctr32() 119 input[8] = key[4]; in ChaCha20_ctr32() 120 input[9] = key[5]; in ChaCha20_ctr32() 121 input[10] = key[6]; in ChaCha20_ctr32() 122 input[11] = key[7]; in ChaCha20_ctr32() 124 input[12] = counter[0]; in ChaCha20_ctr32() [all …]
|
/openssl/test/recipes/ |
H A D | 20-test_mac.t | 42 input => '00010203', 47 input => '00010203', 60 input => '00', 81 input => '02000000000000000000000000000000', 93 input => '00', 98 input => '00', 103 input => '00', 111 input => '00', 148 my $bin = pack("H*", $input); 192 my ($cmdarray, $type, $input, $expect) = @_; [all …]
|
H A D | 04-test_pem_reading.t | 85 foreach my $input (keys %cert_expected) { 87 my @data = run(app([@common, data_file($input)], stderr => undef), capture => 1); 89 is((scalar @match > 0 ? 1 : 0), $cert_expected{$input}); 93 foreach my $input (keys %dsa_expected) { 98 @data = run(app([@common, data_file($input)], stderr => undef), capture => 1); 101 is((scalar @match > 0 ? 1 : 0), $dsa_expected{$input});
|
/openssl/util/perl/OpenSSL/Util/ |
H A D | Pod.pm | 96 my $input = shift; 104 if (ref $input eq "") { 105 $filename = $input; 106 open $fh, $input or die "Trying to read $filename: $!\n"; 107 print STDERR "DEBUG: Reading $input\n" if $defaults{debug}; 108 $input = $fh; 110 if (ref $input eq "GLOB") { 112 $contents = <$input>;
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpmac_blake.txt | 149 Input = "Sample input for keylen<blocklen and custom" 155 Input = "Sample input for keylen<blocklen and custom" 161 Input = "Sample input for keylen<blocklen and salt" 167 Input = "Sample input for keylen<blocklen and salt" 184 Input = "Sample input for outlen<digest_length" 190 Input = "Sample input for outlen<digest_length" 196 Input = "Combo input with outlen, custom and salt" 217 Input = "Sample input for keylen<blocklen and salt" 223 Input = "Sample input for keylen<blocklen and salt" 241 Input = "Sample input for outlen<digest_length" [all …]
|
H A D | evpciph_aes_cts.txt | 17 # 32 bytes input 24 # 48 bytes input 31 # 64 bytes input 53 # 31 bytes input 62 # 32 bytes input 71 # 47 bytes input 91 # 47 bytes input 187 # 47 bytes input 251 # 31 bytes input 269 # 47 bytes input [all …]
|
/openssl/demos/digest/ |
H A D | EVP_MD_stdin.c | 34 int demonstrate_digest(BIO *input) in demonstrate_digest() argument 96 while ((ii = BIO_read(input, buffer, sizeof(buffer))) > 0) { in demonstrate_digest() 127 BIO *input = BIO_new_fd(fileno(stdin), 1); in main() local 129 if (input != NULL) { in main() 130 result = demonstrate_digest(input); in main() 131 BIO_free(input); in main()
|
H A D | BIO_f_md.c | 41 BIO *input = NULL; in main() local 50 input = BIO_new_fd(fileno(stdin), 1); in main() 51 if (input == NULL) { in main() 92 BIO *reading = BIO_push(bio_digest, input); in main() 116 BIO_free(input); in main()
|
/openssl/test/ |
H A D | ossl_store_test.c | 45 char *input = test_mk_file_path(inputdir, infile); in test_store_open() local 47 ret = TEST_ptr(input) in test_store_open() 50 && TEST_ptr(sctx = OSSL_STORE_open_ex(input, NULL, NULL, ui_method, in test_store_open() 57 OPENSSL_free(input); in test_store_open() 163 char *input = test_mk_file_path(inputdir, sm2file); in test_store_attach_unregistered_scheme() local 165 ret = TEST_ptr(input) in test_store_attach_unregistered_scheme() 168 && TEST_ptr(bio = BIO_new_file(input, "r")) in test_store_attach_unregistered_scheme() 179 OPENSSL_free(input); in test_store_attach_unregistered_scheme()
|
H A D | mdc2_internal_test.c | 26 const char *input; member 60 MDC2_Update(&c, (const unsigned char *)testdata.input, in test_mdc2() 61 strlen(testdata.input)); in test_mdc2()
|
H A D | sm4_internal_test.c | 29 static const uint8_t input[SM4_BLOCK_SIZE] = { in test_sm4_ecb() local 58 memcpy(block, input, SM4_BLOCK_SIZE); in test_sm4_ecb() 73 if (!TEST_mem_eq(block, SM4_BLOCK_SIZE, input, SM4_BLOCK_SIZE)) in test_sm4_ecb()
|
H A D | sha_test.c | 14 static int test_static_sha_common(const char *input, size_t length, in test_static_sha_common() argument 21 const unsigned char *in = (unsigned char *)input; in test_static_sha_common() 22 const size_t in_len = strlen(input); in test_static_sha_common()
|
/openssl/ssl/record/ |
H A D | ssl3_record.c | 153 wr->input, (int)wr->length); in ssl3_do_compress() 159 wr->input = wr->data; in ssl3_do_compress() 197 memmove(rec->data, rec->input, rec->length); in ssl3_enc() 198 rec->input = rec->data; in ssl3_enc() 220 memset(&rec->input[rec->length], 0, i); in ssl3_enc() 222 rec->input[l - 1] = (unsigned char)(i - 1); in ssl3_enc() 295 if (recs[ctr].data != recs[ctr].input) { in tls1_enc() 303 recs[ctr].input, in tls1_enc() 315 recs[ctr].input = recs[ctr].data; in tls1_enc() 389 recs[ctr].input[loop] = padval; in tls1_enc() [all …]
|
/openssl/include/openssl/ |
H A D | des.h | 78 void DES_ecb3_encrypt(const_DES_cblock *input, DES_cblock *output, 82 DES_LONG DES_cbc_cksum(const unsigned char *input, DES_cblock *output, 89 void DES_cbc_encrypt(const unsigned char *input, unsigned char *output, 93 void DES_ncbc_encrypt(const unsigned char *input, unsigned char *output, 97 void DES_xcbc_encrypt(const unsigned char *input, unsigned char *output, 105 void DES_ecb_encrypt(const_DES_cblock *input, DES_cblock *output, 142 void DES_ede3_cbc_encrypt(const unsigned char *input, unsigned char *output, 169 void DES_pcbc_encrypt(const unsigned char *input, unsigned char *output, 173 DES_LONG DES_quad_cksum(const unsigned char *input, DES_cblock output[],
|
/openssl/apps/ |
H A D | tsget.in | 157 my $input = $_; 158 my ($base, $path) = fileparse($input, '\.[^.]*'); 162 STDERR->printflush("$input: ") if $options{v}; 165 if ($input eq "-") { 170 open INPUT, "<" . $input 171 or warn("$input: could not open input file: $!\n"), next REQUEST; 174 or warn("$input: could not close input file: $!\n"), next REQUEST; 182 die "$input: fatal error: $error\n";
|
/openssl/util/perl/OpenSSL/ |
H A D | OID.pm | 149 my $input = shift; 157 if ($input =~ m/^\s*(${obj_re})\s*$/x) { 160 } elsif ($input =~ m/^\s*(${xmlobj_re})\s*$/) { 165 croak "Invalid ASN.1 object '$input'" unless @components; 166 die "Internal error when parsing '$input'"
|
/openssl/doc/man3/ |
H A D | DES_random_key.pod | 33 void DES_ecb_encrypt(const_DES_cblock *input, DES_cblock *output, 35 void DES_ecb2_encrypt(const_DES_cblock *input, DES_cblock *output, 37 void DES_ecb3_encrypt(const_DES_cblock *input, DES_cblock *output, 143 (ECB) mode. It always transforms the input data, pointed to by 145 If the I<encrypt> argument is nonzero (DES_ENCRYPT), the I<input> 152 DES_ecb3_encrypt() encrypts/decrypts the I<input> block by using 154 the input with I<ks1>, decrypting with the key schedule I<ks2>, and 202 routine will encrypt the input bytes to output and then update ivec 210 takes an array of characters as input and outputs an array of 274 input byte. The same holds for output. This function has been [all …]
|
H A D | OSSL_DECODER_CTX_new_for_pkey.pod | 42 I<input_struct>, I<keytype> and I<selection> to specify what the input is 50 decoder implementations that may be able to process the encoded input into 55 I<input_struct> which specifies a starting input type and input structure. 57 will find out the input type on their own. 65 find out the keytype and key contents on their own from the input they get. 90 Available input types depend on the implementations that available providers 93 Among the known input types that OpenSSL decoder implementations offer 95 See L<openssl-glossary(7)> for further information on what these input 100 Available input structures depend on the implementations that available 103 Among the known input structures that OpenSSL decoder implementations [all …]
|
H A D | OSSL_DECODER_CTX.pod | 87 figure out what the input data is and to attempt to unpack it into one of 89 the output from one can become the input for another. This allows having 96 added those that take the specified input type, and functions like 98 the decoder implementations that take that input type. For example, if the 99 input type is set to C<DER>, a PEM to DER decoder will be ignored. 101 The input type can also be NULL, which means that the caller doesn't know 102 what type of input they have. In this case, OSSL_DECODER_from_bio() will 104 discover what kind of input the caller gave it. 131 a decoder, to be used to attempt to decode some encoded input. 204 implementation's input type from a decoder instance I<decoder_inst>. [all …]
|
/openssl/doc/man1/ |
H A D | openssl-engine.pod.in | 44 description of each command; the third adds the input flags, and the 45 final option adds the internal input flags. 83 (input flags): STRING 85 (input flags): NUMERIC 87 (input flags): STRING 89 (input flags): NUMERIC 91 (input flags): NUMERIC 93 (input flags): STRING 95 (input flags): NO_INPUT
|
H A D | openssl-format-options.pod | 5 openssl-format-options - OpenSSL command input and output format options 16 Several OpenSSL commands can take input or generate output in a variety 20 files in any of the B<DER>, B<PEM> or B<P12> formats. Specifying their input 22 the possible formats. However if the B<DER> or B<PEM> input format is specified 25 In order to access a key via an engine the input format B<ENGINE> may be used; 41 The format of the input or output streams. 45 Format of a private key input source. 49 Format of a CRL input source.
|
H A D | openssl-pkeyutl.pod.in | 57 This specifies the input filename to read data from or standard input 62 This indicates that the input data is raw data, which is not hashed by any 88 The input key, by default it should be a private key. 111 The input file is a public key. 115 The input is a certificate containing a public key. 119 Reverse the order of the input buffer. This is useful for some libraries 129 Verify the input data (which must be a hash) against the signature file and 134 Verify the input data (which must be a hash) and output the recovered data. 138 Encrypt the input data using a public key. 142 Decrypt the input data using a private key. [all …]
|
/openssl/ssl/record/methods/ |
H A D | tls1_meth.c | 178 if (recs[ctr].data != recs[ctr].input) { in tls1_cipher() 181 } else if (RAND_bytes_ex(rl->libctx, recs[ctr].input, in tls1_cipher() 265 recs[ctr].input[loop] = padval; in tls1_cipher() 291 data[ctr] = recs[ctr].input; in tls1_cipher() 343 recs[0].input += EVP_GCM_TLS_EXPLICIT_IV_LEN; in tls1_cipher() 346 recs[0].input += EVP_CCM_TLS_EXPLICIT_IV_LEN; in tls1_cipher() 349 recs[0].input += bs; in tls1_cipher() 376 tmpr = EVP_Cipher(ds, recs[0].data, recs[0].input, in tls1_cipher() 391 recs[ctr].input += EVP_GCM_TLS_EXPLICIT_IV_LEN; in tls1_cipher() 395 recs[ctr].input += EVP_CCM_TLS_EXPLICIT_IV_LEN; in tls1_cipher() [all …]
|
H A D | ssl3_meth.c | 124 memset(&rec->input[rec->length], 0, i); in ssl3_cipher() 126 rec->input[l - 1] = (unsigned char)(i - 1); in ssl3_cipher() 140 if (!EVP_CipherUpdate(ds, rec->data, &outlen, rec->input, in ssl3_cipher() 164 if (EVP_Cipher(ds, rec->data, rec->input, (unsigned int)l) < 1) { in ssl3_cipher() 256 header, rec->input, in ssl3_mac() 278 || EVP_DigestUpdate(md_ctx, rec->input, rec->length) <= 0 in ssl3_mac()
|
/openssl/providers/common/der/ |
H A D | oids_to_c.pm | 74 my $input = File::Spec->catfile($opts{dir}, $file); 75 open my $fh, $input or die "Reading $input: $!\n";
|